0Day Forums
((W)) Interface's Of Mass D357RUC710N. - Printable Version

+- 0Day Forums (https://zeroday.vip)
+-- Forum: Coding (https://zeroday.vip/Forum-Coding)
+--- Forum: Programming discussions (https://zeroday.vip/Forum-Programming-discussions)
+--- Thread: ((W)) Interface's Of Mass D357RUC710N. (/Thread-W-Interface-s-Of-Mass-D357RUC710N)



((W)) Interface's Of Mass D357RUC710N. - ormond215 - 07-07-2011

((W))Interface's of mass destruction.

Hello everyone just wanted to say thanks for all the feed back and support. Just want to talk a little about today's tutorial and how I found it is super effective but before we start.

This tutorial is for educational purposes only I am not responsible for what you do with this information.
After all we don't learn to hack, we hack to learn.



Now what we are going to be doing is deauthentication all connected computer from an access point. Now I know what your thinking whats the big deal. Well what happens to people once they get disconnected they refresh the network list right. Right so when they are going to refresh the list we are going to flood the air with fake access points and when I mean flood we really flood the air some if not all computer wireless drivers will crash. I don't know about you but that sounds like allot of fun don't take this the wrong way I'm a good guy but sometimes good guys get bored and want to see people's reaction when something does go wrong and they start restarting their computers. So if this sounds kinda fun to do to your dad, mom, sister, friend or whoever is ON YOUR OWN NETWORK then what the hell give it a try.


Let's get started
About MDK3


Using MDK3 is quite simple, since it comes with lots of help screens directly included in the code.
You can easily access them by typing only mdk3
MDK3 displays the main help screen. To see all possible options, type mdk3 --fullhelp
To see only information for a specific test, type mdk3 --help followed by the test mode identifier (b, a, p, d, m or x)

Before you can use MDK3, you need to setup your wireless adaptor. As far as there are different driver architectures, the way to setup your adaptor may vary depending on which driver is in use. To make this procedure easy, it is recommended to use airmon-ng from the aircrack project, since this can setup almost every known driver correctly.
To enable injection, your card needs to be started, switched to the monitor and a bitrate and channel have to be set.


Now lets put our wireless interface in monitor mode and a quick ifconfig to find out our mac address.


Hidden Content

[Image: 1.png]


Lets go to the mdk3 directory

Hidden Content

Now we want to deauthenticated everyone in our WLAN range in order to do that we need to make a list of mac numbers that we DO NOT WANT TO GET AFFECTED witch is call a whitelist. So in my whitelist I'm going to be just adding my mac address because I don't care about all the others. So copy you mac address and type this in the MDK3 directory.

echo YOUR_MAC > whitelist

Hidden Content


[Image: 2.png]


Now let's look at our d option the Deauthentication / Disassociation Amok Mode:

d - Deauthentication / Disassociation Amok Mode
Kicks everybody found from AP
OPTIONS:
-w
Read file containing MACs not to care about (Whitelist mode)
-b
Read file containing MACs to run test on (Blacklist Mode)
-s
Set speed in packets per second (Default: unlimited)
-c [chan,chan,chan,...]
Enable channel hopping. Without providing any channels, mdk3 will hop an all
14 b/g channels. Channel will be changed every 5 seconds.


So what we are going to use is the w option whitelist mode. leave the s option alone it's set to unlimited. Now the c option channel is up to you but I'm going with all AP's on channel 6 because most AP's are on that channel by default.

Hidden Content


[Image: whitelist.png]


So now we have successfully launched the attack soon everyone will be disconnected. Now lets start flooding the air with fake access points. Open a new shell and browse to MDK3 directory and run this.


Hidden Content


b - Beacon Flood Mode
Sends beacon frames to show fake APs at clients.
This can sometimes crash network scanners and even drivers!
OPTIONS:
-n
Use SSID instead of randomly generated ones
-f
Read SSIDs from file
-v
Read MACs and SSIDs from file. See example file!
-d
Show station as Ad-Hoc
-w
Set WEP bit (Generates encrypted networks)
-g
Show station as 54 Mbit
-t
Show station using WPA TKIP encryption
-a
Show station using WPA AES encryption
-m
Use valid accesspoint MAC from OUI database
-h
Hop to channel where AP is spoofed
This makes the test more effective against some devices/drivers
But it reduces packet rate due to channel hopping.
-c
Fake an AP on channel . If you want your card to hop on
this channel, you have to set -h option, too!
-s
Set speed in packets per second (Default: 50)
a - Authentication DoS mode


Now let me explain the b options is beacon flood mode. The -g option is Show station as 54 Mbit. -c option is channel now you can put an h if you want it to hope but if you specify a channel it will produce fake APs faster.


[Image: 3.png]


Now when the user refreshes his network list he should a never ending scan in linux or windows.


[Image: APoints.png]


And thats it for this tutorial.
More tutorials and fun things to do here @

[To see links please register here]


DON'T FORGET A + REP I WANT TO PASS 1234HotMaster ^_^


RE: ((W)) Interface's Of Mass D357RUC710N. - zygon463319 - 07-07-2011

Your more likely to get you @$$ kicked before getting arrested. I would worry more about covering my screen than changing my mac since you should be doing this with 2 wireless interfaces.


RE: ((W)) Interface's Of Mass D357RUC710N. - Imogene126905 - 07-07-2011

awesome tut! just don't forget to change your mac you might get arrested


RE: ((W)) Interface's Of Mass D357RUC710N. - Mrkorun821 - 07-07-2011

lol we posted the same thing hahaha like teacher, like student


RE: ((W)) Interface's Of Mass D357RUC710N. - schmitz855 - 07-07-2011

this is so awesome

All wireless are belong to me :smile:)




RE: ((W)) Interface's Of Mass D357RUC710N. - fiveandten682 - 07-08-2011

Great contribution :biggrin:
thanks for the tutorial.